SlideShare uma empresa Scribd logo
1 de 36
DIGITAL WATERMARKING

Sejal Visawadia
Watermark
What is Watermarking?

“ Watermarking can be considered as a special technique
of steganography where one message is embedded in
another and the two messages are related to each other in
some way. “
Example :The presence of specific patterns in currency

notes

which are visible only when the note is held to light is
a well known example for watermark.
Example of a conventional
watermark

Courtesy of Blue Spike, Inc.
Digital Watermark
“ Digital watermarking is similar to
watermarking physical objects, except that
the watermarking technique is used for
digital content instead of physical objects.”
Digital Watermark (Cont..)
In digital watermarking a low-energy signal is
imperceptibly embedded in another signal. The
low-energy signal is called watermark.
The main signal in which the watermark is
embedded is referred to as cover signal since
it covers the watermark.
An entity called watermark key used for
embedding and detecting watermark signal
Watermark key is private
Behind The Technology
Sending Side …

Watermark Embedding process


Water mark
 Original message
 Key


Water marked image
Behind The Technology
Receiving Side …

Watermark retrieval process



Water marked image
Key

 Confidential

message
The Overall System
The Technology Roars…
Importance Of
Digital Watermarking
© Copyright

Information
© On-line music industry
© News gathering using digital cameras
Types of Digital Watermarking







Robust & Fragile Watermarking
Visible & Invisible Watermarking
Public & Private Watermarking
Asymmetric & Symmetric
Watermarking
Steganograhic & NonSteganographic watermarking
Robust & Fragile
Watermarking


Robust Watermarking:-Modification of
watermarked content will not affect
watermark



Fragile Watermarking:-Watermark get
destroyed when watermarked content is
modified or tampered with
Visible & Invisible
Watermarking
 On Visible watermarking, contents are

visible
Visible & Invisible
Watermarking (Cont..)


Invisible watermarking are not viewed
on just looking
Public & Private
Watermarking
•

Public Watermarking
Users of content are authorized to detect
watermark

•

Private Watermarking
Users not authorized to detect watermark
Asymmetric & Symmetric
watermarking


In Asymmetric watermarking different
keys used for embedding and detecting
watermark
Asymmetric & Symmetric
watermarking (Cont..)


In symmetric watermarking same keys
are used for embedding and detecting
watermarks
Steganographic & NonSteganographic Watermarking


Steganographic Watermarking
User unaware of the presence of a
watermark

eg:-Used in finger printing
applications
 Non-Steganographic WM:User aware of the presence of a
watermark.

e.g.:-User to detect piracy
Digital Watermarking
Techniques
 LSB

Watermarking
 Color Separation Technique
 Bit Stream Watermarking
 Word Space Coding, Line Space
Coding &Character Coding
LSB Watermarking


Lower order bits of selected pixels in
the image are used to store watermarks



Replacing lower order bits of each
pixel with higher order bit of different image
Color Separation Technique


Watermark appears only in one of the

color bands


Used to watermark in still images



Can be extended to moving images
Bit Stream Watermarking


Used in audio watermarking



Data is directly inserted into compressed
audio files
Word Space Coding, Line Space
Coding & Character Coding


Used for watermarking in text documents



In word space coding, the spaces
between words are altered to embed
watermark code. In line space coding the
space between the lines are altered and in
character coding some of the characters
are imperceptibly modified (i.e., made
larger, serifs enhanced, etc).
Applications of Digital
Watermarking
Copy Protection
 Content Authentication
 Copyright Protection
 Metadata Tagging

Copy Protection



It limits the access to copyrighted material and
inhibit the copy process
Content Authentication
 Robust

watermarks are used in this area

Example:-A photographic information that
may be presented as evidence in court.
Since digital images can be easily
manipulated, there is a need to provide
proof that an image has not been altered.
Content Authentication
Copyright Protection
 One

of the main application

 Embedding

watermarks in digital

photographs
Metadata Tagging
 Watermarks

convey object specific
information to users of the object.

 Used

to attach patient identification data to
medical images, or to highlight regions of
diagnostic significance.
Attacks to Digital
Watermarking



Stirmark
Mosaic Attack
Stirmark






It is tool developed to test the robustness
of image marking system
Stirmark is commonly produced by
printers and scanners
IBM researchers have recently
announced a technique that defeats the
stir mark attack.
Detects and measures the geometric
distortions in images, and removes the
distortion to restore image geometry
Stirmark Example
Mosaic Attack
Use of a web crawler
 Dividing into sub images with rendition
instructions
 Browser will be rearranging the sub images
to appear as the original
 Sub images will be sufficiently small that no
single image on its own will contain a
recognizable mark.

Mosaic Attack Example
Conclusion


DRM systems and content management are
important for protection of rights of digital
multimedia creations that are distributed on the
Internet. Digital watermarking is an effective
technique for embedding rights information in
digital multimedia data.



Digital watermark technology can be used in
consumer electronic devices like digital still
camera, digital video camera, DVD players, MP3
players, etc., for various applications like providing
controlled access, preventing illegal replication and
watermark embedding
Conclusion (Contd..)


Digital information can easily be
disseminated and copied via global
networks.



The future of digital watermarking relies on
setting standards and creating applications
so that creators of digital content can easily
implement it.
THANK YOU

Mais conteúdo relacionado

Mais procurados

Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 

Mais procurados (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Steganography
SteganographySteganography
Steganography
 

Destaque

12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
yuti_3011
 

Destaque (12)

Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 

Semelhante a Digitalwatermarking

Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 

Semelhante a Digitalwatermarking (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
50120130406038
5012013040603850120130406038
50120130406038
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 

Mais de Sej Visawadia (11)

Natural pickles
Natural picklesNatural pickles
Natural pickles
 
Sez india
Sez indiaSez india
Sez india
 
Instagram
InstagramInstagram
Instagram
 
Content Marketing
Content MarketingContent Marketing
Content Marketing
 
Asian paints
Asian paintsAsian paints
Asian paints
 
Uttar pradesh tourism
Uttar pradesh tourismUttar pradesh tourism
Uttar pradesh tourism
 
Creativity
CreativityCreativity
Creativity
 
Nfc
NfcNfc
Nfc
 
QR codes
QR codesQR codes
QR codes
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Graphic design
Graphic designGraphic design
Graphic design
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Digitalwatermarking

  • 2. Watermark What is Watermarking? “ Watermarking can be considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way. “ Example :The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.
  • 3. Example of a conventional watermark Courtesy of Blue Spike, Inc.
  • 4. Digital Watermark “ Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects.”
  • 5. Digital Watermark (Cont..) In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. An entity called watermark key used for embedding and detecting watermark signal Watermark key is private
  • 6. Behind The Technology Sending Side … Watermark Embedding process  Water mark  Original message  Key  Water marked image
  • 7. Behind The Technology Receiving Side … Watermark retrieval process   Water marked image Key  Confidential message
  • 8. The Overall System The Technology Roars…
  • 9. Importance Of Digital Watermarking © Copyright Information © On-line music industry © News gathering using digital cameras
  • 10. Types of Digital Watermarking      Robust & Fragile Watermarking Visible & Invisible Watermarking Public & Private Watermarking Asymmetric & Symmetric Watermarking Steganograhic & NonSteganographic watermarking
  • 11. Robust & Fragile Watermarking  Robust Watermarking:-Modification of watermarked content will not affect watermark  Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with
  • 12. Visible & Invisible Watermarking  On Visible watermarking, contents are visible
  • 13. Visible & Invisible Watermarking (Cont..)  Invisible watermarking are not viewed on just looking
  • 14. Public & Private Watermarking • Public Watermarking Users of content are authorized to detect watermark • Private Watermarking Users not authorized to detect watermark
  • 15. Asymmetric & Symmetric watermarking  In Asymmetric watermarking different keys used for embedding and detecting watermark
  • 16. Asymmetric & Symmetric watermarking (Cont..)  In symmetric watermarking same keys are used for embedding and detecting watermarks
  • 17. Steganographic & NonSteganographic Watermarking  Steganographic Watermarking User unaware of the presence of a watermark eg:-Used in finger printing applications  Non-Steganographic WM:User aware of the presence of a watermark. e.g.:-User to detect piracy
  • 18. Digital Watermarking Techniques  LSB Watermarking  Color Separation Technique  Bit Stream Watermarking  Word Space Coding, Line Space Coding &Character Coding
  • 19. LSB Watermarking  Lower order bits of selected pixels in the image are used to store watermarks  Replacing lower order bits of each pixel with higher order bit of different image
  • 20. Color Separation Technique  Watermark appears only in one of the color bands  Used to watermark in still images  Can be extended to moving images
  • 21. Bit Stream Watermarking  Used in audio watermarking  Data is directly inserted into compressed audio files
  • 22. Word Space Coding, Line Space Coding & Character Coding  Used for watermarking in text documents  In word space coding, the spaces between words are altered to embed watermark code. In line space coding the space between the lines are altered and in character coding some of the characters are imperceptibly modified (i.e., made larger, serifs enhanced, etc).
  • 23. Applications of Digital Watermarking Copy Protection  Content Authentication  Copyright Protection  Metadata Tagging 
  • 24. Copy Protection  It limits the access to copyrighted material and inhibit the copy process
  • 25. Content Authentication  Robust watermarks are used in this area Example:-A photographic information that may be presented as evidence in court. Since digital images can be easily manipulated, there is a need to provide proof that an image has not been altered.
  • 27. Copyright Protection  One of the main application  Embedding watermarks in digital photographs
  • 28. Metadata Tagging  Watermarks convey object specific information to users of the object.  Used to attach patient identification data to medical images, or to highlight regions of diagnostic significance.
  • 30. Stirmark     It is tool developed to test the robustness of image marking system Stirmark is commonly produced by printers and scanners IBM researchers have recently announced a technique that defeats the stir mark attack. Detects and measures the geometric distortions in images, and removes the distortion to restore image geometry
  • 32. Mosaic Attack Use of a web crawler  Dividing into sub images with rendition instructions  Browser will be rearranging the sub images to appear as the original  Sub images will be sufficiently small that no single image on its own will contain a recognizable mark. 
  • 34. Conclusion  DRM systems and content management are important for protection of rights of digital multimedia creations that are distributed on the Internet. Digital watermarking is an effective technique for embedding rights information in digital multimedia data.  Digital watermark technology can be used in consumer electronic devices like digital still camera, digital video camera, DVD players, MP3 players, etc., for various applications like providing controlled access, preventing illegal replication and watermark embedding
  • 35. Conclusion (Contd..)  Digital information can easily be disseminated and copied via global networks.  The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.